[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92749-1

Platform: cpe:/o:ubuntu:ubuntu_linux:16.04, cpe:/o:ubuntu:ubuntu_linux:18.04Date: (C)2020-10-12   (M)2023-07-04



This variable limits the types of ciphers that SSH can use during communication. Rationale: Based on research conducted at various institutions, it was determined that the symmetric portion of the SSH Transport Protocol (as described in RFC 4253) has security weaknesses that allowed recovery of up to 32 bits of plaintext from a block of ciphertext that was encrypted with the Cipher Block Chaining (CBD) method. From that research, new Counter mode algorithms (as described in RFC4344) were designed that are not vulnerable to these types of attacks and these algorithms are now recommended for standard use.


Parameter:

[cipher_list]


Technical Mechanism:

Edit the /etc/ssh/sshd_config file to set the parameter as follows: Ciphers aes128-ctr,aes192-ctr,aes256-ctr

CCSS Severity:CCSS Metrics:
CCSS Score : 6.4Attack Vector: ADJACENT_NETWORK
Exploit Score: 0.5Attack Complexity: HIGH
Impact Score: 5.9Privileges Required: HIGH
Severity: MEDIUMUser Interaction: NONE
Vector: AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:70645
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:65737


OVAL    2
oval:org.secpod.oval:def:65737
oval:org.secpod.oval:def:70645
XCCDF    2
xccdf_org.secpod_benchmark_general_Ubuntu_16_04
xccdf_org.secpod_benchmark_general_Ubuntu_18_04

© SecPod Technologies